Problem
Task A
Discuss system hardening strategies and techniques including updates and patches, default logon/passwords, anonymous access, removal of unneeded services, separation of production and development environments, and settings such as password length and complexity by answering the following questions:
a) What hardening guidelines or standards are you familiar with?
b) What steps have you taken to harden systems?
c) What function do each of the strategies discussed serve?
Task B
Discuss the phases of a typical information security incident response. Using the information presented in the handout, discuss the following questions:
a) What are the effective responses to a security breach?
b) Which actions you would recommend for each phase?
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.